Academic literature on the topic 'LI. Authentication, and access control'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'LI. Authentication, and access control.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "LI. Authentication, and access control"

1

Junquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos, and José-Javier Martinez-Herráiz. "Access Control beyond Authentication." Security and Communication Networks 2021 (October 1, 2021): 1–11. http://dx.doi.org/10.1155/2021/8146553.

Full text
Abstract:
Nowadays, the Zero Trust model has become one of the standard security models. This paradigm stipulates as mandatory the protection of each endpoint, looking for providing security to all the network. To meet this end, it is necessary to guarantee the integrity of the access control systems. One possibility for bringing security to the different endpoints is continuous authentication, as an access control system. Continuous authentication is the set of technologies capable of determining if a user’s identity remains in time; whether he is the legitimate user (i.e., the only one who should know the secret credentials) or the identity has been impersonated by someone else after the authentication’s process was completed. Continuous authentication does not require the active participation of the user. Aiming to identify the different technologies involved in continuous authentication’s implementations, evaluation methods, and its use cases, this paper presents a systematic review that synthesizes the state of the art. This review is conducted to get a picture about which data sources could allow continuous authentication, in which systems it has been successfully implemented, and which are the most adequate ways to process the data. This review also identifies the defining dimensions of continuous authentication systems.
APA, Harvard, Vancouver, ISO, and other styles
2

Sandhu, Ravi, and Pierangela Samarati. "Authentication, access control, and audit." ACM Computing Surveys 28, no. 1 (March 1996): 241–43. http://dx.doi.org/10.1145/234313.234412.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Jing, Yang Xiao, and C. L. Philip Chen. "Internet of things' authentication and access control." International Journal of Security and Networks 7, no. 4 (2012): 228. http://dx.doi.org/10.1504/ijsn.2012.053461.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Harn, L., and H. Y. Lin. "Integration of user authentication and access control." IEE Proceedings E Computers and Digital Techniques 139, no. 2 (1992): 139. http://dx.doi.org/10.1049/ip-e.1992.0022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ma, Binhao, Xurui Zheng, Can Zhao, Yibing Wang, Dejun Wang, and Bo Meng. "A secure and decentralized SSI authentication protocol with privacy protection and fine-grained access control based on federated blockchain." PLOS ONE 17, no. 9 (September 23, 2022): e0274748. http://dx.doi.org/10.1371/journal.pone.0274748.

Full text
Abstract:
Self-sovereign identity authentication protocol is an active research topic in the field of identity authentication and management. However, the current SSI authentication protocols pay little attention to privacy protection and the fine-grained access control. Therefore, a secure and decentralized SSI authentication protocol with privacy protection and fine-grained access control is proposed. Firstly, the formal model of SSI including the SDPP-SSI identity model and management model is presented. And then, based on the federated blockchain, the distributed identifier is used as a global identifier for users in the decentralized domain. Finally, the verifiable statement is encapsulated using a policy control signature supporting privacy protection to develop the user’s access control for identity registration in the centralized domain. Compared with the related work (Lin 2018, Zhu 2018, Stokkink 2018, Hammudoglu 2017, Othman 2017, Abraham 2018, Guan 2019, Lin 2019) from controllability, security, flexibility, privacy protection, authentication and fine-grained access control, the proposed SSI authentication protocol not only meets controllability, authentication, and flexibility, but also supports privacy protection and fine-grained access control.
APA, Harvard, Vancouver, ISO, and other styles
6

Zuva, T. "Hybridization of Bimodal Biometrics for Access Control Authentication." International Journal of Future Computer and Communication 3, no. 6 (December 2014): 444–51. http://dx.doi.org/10.7763/ijfcc.2014.v3.344.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kakarla, Geeta, and S. Phani Kumar. "Blockchain Powered Mutual Authentication and Access Control Protocol." International Journal of Computer Networks and Applications 9, no. 1 (February 28, 2022): 103. http://dx.doi.org/10.22247/ijcna/2022/211629.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

SUMI, Kazuhiko. "Biometrics Authentication and Application to Access Control Systems." Journal of The Institute of Electrical Engineers of Japan 129, no. 4 (2009): 237–40. http://dx.doi.org/10.1541/ieejjournal.129.237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Galka, Jakub, Mariusz Masior, and Michal Salasa. "Voice authentication embedded solution for secured access control." IEEE Transactions on Consumer Electronics 60, no. 4 (November 2014): 653–61. http://dx.doi.org/10.1109/tce.2014.7027339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Karger, Paul A. "Authentication and discretionary access control in computer networks." Computers & Security 5, no. 4 (December 1986): 314–24. http://dx.doi.org/10.1016/0167-4048(86)90052-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "LI. Authentication, and access control"

1

SILVESTRE, BRUNO OLIVEIRA. "INTERINSTITUTIONAL ACCESS: AUTHENTICATION AND ACCESS CONTROL." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2005. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=6619@1.

Full text
Abstract:
COORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR
O uso de computação distribuída vem expandindo seu escopo, saindo de aplicações em redes locais para aplicações envolvendo diversas instituições. Em termos de segurança, essa expansão introduz desafios em identificar usuários oriundos das diferentes organizações e definir seus direitos de acesso a determinado recurso. Abordagens comuns adotam a replicação do cadastro dos usuários pelas diversas instituições ou o compartilhamente de uma mesma identidade por um conjunto de usuários. Entretanto, essas estratégias apresentam deficiências, demandando, por exemplo, maior esforço de gerência por parte dos administradores e até esbarrando em políticas de privacidade. Neste trabalho propomos uma arquitetura que utiliza o conceito de papéis para a autenticação e o controle de acesso entre diferentes instituições. Baseado em uma relação de confiança entre as organizações, a arquitetura permite que os usuários sejam autenticados na instituições onde estão afiliados e utiliza o papel por eles desempenhados para controlar o acesso aos recursos disponibilizados pelas demais organizações.
Distributed computing has been expanding its scope from local area network applications to wide-area applications, involving different organizations. This expansion implies in several new security challenges, such as the identification of users originating from different organizations and the definition of their access rights. Commom aproaches involve replicating user data in several institutions or sharing identities among sets of users. However, these approaches have several limitations, sucj as the increased management effort of administrators or problems with privacy policies. This work proposes a framework for inter-institucional authentication. The framework is based on the concepts of RBAC (role-based access control) and of trust between organizations.
APA, Harvard, Vancouver, ISO, and other styles
2

Johnson, Henric. "Toward adjustable lightweight authentication for network access control /." Karlskrona : Blekinge Institute of Technology, 2005. http://www.bth.se/fou/Forskinfo.nsf/allfirst2/30ef501d402539d3c12570f5005184f4?OpenDocument.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Behrad, Shanay. "Slice specific authentication and access control for 5G." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS007.

Full text
Abstract:
La cinquième génération de réseaux cellulaires mobiles, 5G, est conçue pour prendre en charge un ensemble de nouveaux cas d'utilisation et exigences, par exemple concernant la qualité de service ou la sécurité. En utilisant les technologies de virtualisation et le concept de découpage de réseau, les opérateurs de réseau 5G seront en mesure de fournir des capacités de connectivité spécifiques afin de prendre en charge ces différents cas d'utilisation. Chaque tranche de réseau (network slice) peut être dédiée à un tiers (c'est-à-dire tout acteur commercial qui n'est pas l'opérateur de réseau) et être conçue pour répondre à ses besoins.Cependant, bien que les tranches de réseau puissent être conçues en activant ou en désactivant certaines fonctions réseau, les mécanismes d'authentification et de contrôle d'accès (AAC) restent les mêmes pour toutes les tranches, avec des composants réseau étroitement couplés.Cette thèse propose 5G-SSAAC (5G Slice-Specific AAC), comme première étape pour introduire une conception à couplage plus lâche dans l'ensemble de l'architecture de réseau 5G. 5G-SSAAC permet aux réseaux 5G de fournir divers mécanismes AAC aux tiers selon leurs exigences de sécurité. Pour évaluer ce mécanisme innovant, la thèse analyse les conséquences de l'utilisation du 5G-SSAAC sur la sécurité de l'ensemble du système 5G. La faisabilité du 5G-SSAAC est également présentée avec la mise en œuvre d'un réseau mobile entièrement virtualisé via un banc d'essai basé sur OAI (Open Air Interface). Ce travail évalue enfin l'impact du mécanisme 5G-SSAAC sur la charge du réseau compte tenu du nombre prévu de messages de signalisation AAC par rapport aux mécanismes AAC existants dans les réseaux cellulaires
The fifth generation of mobile cellular networks, 5G, is designed to support a set of new use cases and requirements, e.g. concerning quality of service or security. Using the virtualization technologies and the concept of network slicing, the 5G network operators will be able to provide specific connectivity capabilities in order to support these various use cases. Each network slice can be dedicated to a 3rd party (i.e., any business actor that is not the network operator), and be designed to fit its requirements.However, although network slices can be designed by enabling or disabling certain network functions, the Authentication and Access Control (AAC) mechanisms remain the same for all slices, with tightly coupled network components.This thesis proposes 5G-SSAAC (5G Slice-Specific AAC), as an initial step to introduce a more loosely coupled design into the whole 5G network architecture. 5G-SSAAC enables 5G networks to provide various AAC mechanisms to the 3rd parties according to their security requirements. To assess this innovative mechanism, the thesis analyses the consequences of using the 5G-SSAAC on the security of the whole 5G system. The feasibility of the 5G-SSAAC is also presented with the implementation of a fully virtualized mobile network through an OAI (Open Air Interface) based testbed. This work finally evaluates the impact of 5G-SSAAC mechanism on the network load considering the anticipated number of AAC signalling messages compared to the existing AAC mechanisms in cellular networks
APA, Harvard, Vancouver, ISO, and other styles
4

OLSSON, JOAKIM. "Method for gesture based authentication in physical access control." Thesis, KTH, Maskinkonstruktion (Inst.), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-209339.

Full text
Abstract:
ASSA Abloy är den största globala leverantören av intelligenta lås och säkerhetslösningar. Företaget strävar ständigt efter att utveckla nya och innovativa lösningar för fysisk passerkontroll. Ett koncept som företaget ville undersöka riktade sig mot att göra det möjligt för användaren att enkelt låsa upp en dörr med hjälp av gester, vilket resulterar i en användarvänlig upplevelse. Tanken var att använda en wearable som en credential-enhet och identifiera användarens gester med sensorerna som tillhandahålls av denna. Gesten som används i denna avhandling var knackar, vilket innebär att användaren låser uppdörren genom att knacka på den. Huvudsyftet med detta arbete var att utveckla ett system som tillåter knackar att användas som en metod för autentisering och att utvärdera systemet baserat på systemsäkerhet och användarvänlighet. Systemet som har utvecklats består av två accelerometersensorer; en belägen i wearablen och en belägen i låset/dörren. Signalerna från varje sensor bearbetas och analyseras för att detektera knackar. Tidskorrelationen mellan knackar som detekteras av varje sensor analyseras för att kontrollera att de härstammar från samma användare. En teoretisk modell av systemet har utvecklats för att underlätta utvärdering av systemet. Utvärderingen av systemet visade att både systemetsäkerheten och användarvänligheten uppnår tillfredsställande värden. Denna avhandling visar att konceptet har stor potential men det krävs ytterligare arbete. Metoderna som har används för att utvärdera systemet i denna avhandling kan på samma sätt användas för att utvärdera system under fortsatt arbete.
ASSA Abloy is the largest global supplier of intelligent locks and security solutions. The company constantly strives to develop new and innovative solutions for physical access control. One concept the company wanted to investigate aimed to allow the user to effortlessly unlock a door using gestures, resulting in a seamless experience. The idea was to use a wearable as a credential device and identifying the user gestures with the sensors supplied by the wearable. The gesture used in this thesis project were knocks, meaning that the user unlocks the door by knocking on it. The main objective of this thesis project was to develop a system allowing knocks to be used as a method of authentication and evaluate the system based on system security and user convenience. The system developed consists of two accelerometer sensors; one located in the wearable and one located in the lock/door. The signals from each sensor are processed and analyzed to detect knocks. The time correlation between the knocks detected by each sensor are analyzed to verify that they originate from the same user. A theoretical model of the system was developed to facilitate the evaluation of the system. The evaluation of the system showed that both the system security and the user continence attained satisfying values. This thesis shows that the concept has high potential but further work is needed. The framework of methods used to evaluate the system in this thesis can in the same way be used to evaluate systems during any further work.
APA, Harvard, Vancouver, ISO, and other styles
5

Burdis, Keith Robert. "Distributed authentication for resource control." Thesis, Rhodes University, 2000. http://hdl.handle.net/10962/d1006512.

Full text
Abstract:
This thesis examines distributed authentication in the process of controlling computing resources. We investigate user sign-on and two of the main authentication technologies that can be used to control a resource through authentication and providing additional security services. The problems with the existing sign-on scenario are that users have too much credential information to manage and are prompted for this information too often. Single Sign-On (SSO) is a viable solution to this problem if physical procedures are introduced to minimise the risks associated with its use. The Generic Security Services API (GSS-API) provides security services in a manner in- dependent of the environment in which these security services are used, encapsulating security functionality and insulating users from changes in security technology. The un- derlying security functionality is provided by GSS-API mechanisms. We developed the Secure Remote Password GSS-API Mechanism (SRPGM) to provide a mechanism that has low infrastructure requirements, is password-based and does not require the use of long-term asymmetric keys. We provide implementations of the Java GSS-API bindings and the LIPKEY and SRPGM GSS-API mechanisms. The Secure Authentication and Security Layer (SASL) provides security to connection- based Internet protocols. After finding deficiencies in existing SASL mechanisms we de- veloped the Secure Remote Password SASL mechanism (SRP-SASL) that provides strong password-based authentication and countermeasures against known attacks, while still be- ing simple and easy to implement. We provide implementations of the Java SASL binding and several SASL mechanisms, including SRP-SASL.
APA, Harvard, Vancouver, ISO, and other styles
6

Subils, Jean-Baptiste. "Authentication Via Multiple Associated Devices." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/5778.

Full text
Abstract:
This thesis presents a practical method of authentication utilizing multiple devices. The factors contributing to the practicality of the method are: the utilization of devices already commonly possessed by users and the amenability to being implemented on a wide variety of devices. The term “device” refers to anything able to perform cryptographic operations, store data, and communicate with another such device. In the method presented herein, multiple devices need to be associated with a single user to provide this user an identity in the system. A public key infrastructure is used to provide this identity. Each of the devices associated with a user possesses a public and private key which allow cryptographic operations to be performed. These operations include signing and encrypting data and will prove the identity of each device. The addition of these identities helps authenticate a single user. A wide variety of devices qualifies to be used by this authentication method. The minimum requirements are: the storage of data such as a private key, the ability to communicate, and a processor to perform the cryptographic operations. Smart devices possess these requirements and the manufacture of such devices can be realized at a reasonable cost. This method is malleable and implemented in numerous authentication protocols. This thesis illustrates and explains several instances of these protocols. The method’s primary novelty is its resistance to theft-based attacks, which results from the utilization of multiple devices to authenticate users. A user associated with multiple devices needs to be in possession of these devices to correctly perform the authentication task. This thesis focuses on the system design of this novel authentication method.
APA, Harvard, Vancouver, ISO, and other styles
7

May, Brian 1975. "Scalable access control." Monash University, School of Computer Science and Software, 2001. http://arrow.monash.edu.au/hdl/1959.1/8043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yildirim, Merve. "Security and usability in password authentication." Thesis, University of Sussex, 2017. http://sro.sussex.ac.uk/id/eprint/71873/.

Full text
Abstract:
This thesis investigates the human-factor problems in password authentication and proposes some usable solutions to these problems by focusing on both forms of knowledge based authentication: textual passwords and graphical passwords. It includes a range of empirical studies to examine users' password-related behaviour and practices in authentication, and helps users to adopt secure password behaviour. This thesis consists of two parts. The first part focuses on traditional text-based passwords. Design flaws and usability issues of existing text-password mechanisms used by many organisations cause employees to adopt insecure password practices. The first work in this thesis investigates the reasons for employees' lack of motivation regarding password protection against security failures. An empirical study is conducted to identify the factors causing employees' insecure behaviours in organisations, and several persuasion strategies are tested to persuade employees to use passwords more safely. The results of the study revealed that some persuasion strategies are effective in motivating users to adopt good password practices. The study also found that the failure of password policies and authentication schemes deployed by organisations is a common problem among the organisations. Considering the results of the first study, in the second work of this thesis, a password guideline/advice study is conducted to help users to create stronger and more memorable passwords. A password guideline including a number of password creation methods and a persuasive message is proposed, and its effectiveness in improving the strength of user-chosen passwords is evaluated. The results show that the users who received the proposed guideline produced stronger and more memorable passwords than the users followed the usual password restrictions while creating their passwords. The results also demonstrate that the given password creation methods can be helpful and inspirational for users to create their own encryption formula. All these works reveal the weaknesses of user-chosen textual passwords and inefficacy of existing text-based password mechanisms. Although these studies show that text-based password mechanisms can be strengthened, they are still problematic where usability is concerned. Thus, the second part of this thesis focuses on another form of knowledge-based authentication: graphical passwords. A novel hybrid authentication scheme integrating text and images is introduced to minimise the brute force and shoulder surfing attacks which text and graphical passwords suffer. In the last work of this thesis, the proposed hybrid scheme is implemented and evaluated. The evaluation shows that the proposed scheme provides security and usability at the same time, and it also makes the password creation process enjoyable for users. In summary, the thesis contributes to the analysis of some key security and usability problems which arise in knowledge-based authentication. A series of empirical studies has been conducted. Based on their results, usable solutions to the human-factor problems in password-based authentication are proposed and evaluated.
APA, Harvard, Vancouver, ISO, and other styles
9

Shen, Ziyi. "Red Door: Firewall Based Access Control in ROS." Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1752358/.

Full text
Abstract:
ROS is a set of computer operating system framework designed for robot software development, and Red Door, a lightweight software firewall that serves the ROS, is intended to strengthen its security. ROS has many flaws in security, such as clear text transmission of data, no authentication mechanism, etc. Red Door can achieve identity verification and access control policy with a small performance loss, all without modifying the ROS source code, to ensure the availability and authentication of ROS applications to the greatest extent.
APA, Harvard, Vancouver, ISO, and other styles
10

Ceccato, Silvia. "Security in Global Navigation Satellite Systems: authentication, integrity protection and access control." Doctoral thesis, Università degli studi di Padova, 2019. http://hdl.handle.net/11577/3425426.

Full text
Abstract:
In the last decades the use of Global Navigation Satellite System (GNSS) positioning has spread through numerous commercial applications and permeated our daily life. Matching this growing interest for precise positioning worldwide, new systems have been designed and deployed, such as Galileo, the European GNSS. As these systems are relied upon in an ever growing number of safety critical applications, it is vital to devise protections and countermeasures against any threats that may target GNSS modules to harm underlying service. The potential economical advantage that derives from disrupting or manipulating the service is indeed an incentive for malicious users to devise smarter and more sophisticated threats. This thesis tackles the evolution of attacks and corresponding security measures in GNSS, investigating state-of-the-art approaches from both the attacker’s and the system’s point of view. The work focuses on various security targets, such as authentication, integrity protection and access control, exploring threats and solutions at both signal and data level. Securing GNSS from malicious entities indeed requires protecting all of its components: the navigation message, the signal-in-space and the computed Position, Velocity and Time (PVT). All three domains are investigated with the aim of assessing the vulnerability of the system to state-of-the-art threats and providing guidelines for the addition of future security features.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "LI. Authentication, and access control"

1

Boonkrong, Sirapat. Authentication and Access Control. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6570-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tricia, Ballad, and Banks Erin K, eds. Access control, authentication, and public key infrastructure. Sudbury, MA: Jones & Bartlett Learning, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Library public access workstation authentication. Washington, D.C: Association of Research Libraries, Office of Leadership and Management Services, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

802.1X port-based authentication. Boca Raton: Auerbach, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Brown, Edwin Lyle. 802.1X Port-Based Authentication. London: Taylor and Francis, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

National Institute of Standards and Technology (U.S.) and RAND Homeland Security and Defense Center, eds. Influences on the adoption of multifactor authentication. Santa Monica: RAND, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Libicki, Martin C. Influences on the adoption of multifactor authentication. Santa Monica: RAND, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

E, Koontz John, Devaney Judith E. 1943-, National Institute of Standards and Technology (U.S.), and United States. Dept. of Energy, eds. An authentication framework for Web access to remote hosts. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

National Institute of Standards and Technology (U.S.). Entity authentication using public key cryptography. Gaithersburg, MD: Information Technology Laboratory, National Institute of Standards and Technology, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Burnett, Mark. Perfect Passwords: Selection, Protection, Authentication. Massachusetts, USA: Syngress, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "LI. Authentication, and access control"

1

Boonkrong, Sirapat. "Biometric Authentication." In Authentication and Access Control, 107–32. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Boonkrong, Sirapat. "Password-Based Authentication." In Authentication and Access Control, 71–105. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Boonkrong, Sirapat. "Multi-factor Authentication." In Authentication and Access Control, 133–62. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Basin, David, Patrick Schaller, and Michael Schläpfer. "Authentication and Access Control." In Applied Information Security, 47–67. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24474-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Boonkrong, Sirapat. "Introduction to Cryptography." In Authentication and Access Control, 1–30. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Boonkrong, Sirapat. "Public Key Infrastructure." In Authentication and Access Control, 31–43. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Boonkrong, Sirapat. "Methods and Threats of Authentication." In Authentication and Access Control, 45–70. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Boonkrong, Sirapat. "Authentication and Key Establishment Protocols." In Authentication and Access Control, 163–95. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Boonkrong, Sirapat. "Current and Future Trends." In Authentication and Access Control, 197–222. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6570-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kirkpatrick, Michael, and Elisa Bertino. "Context-Dependent Authentication and Access Control." In iNetSec 2009 – Open Research Problems in Network Security, 63–75. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05437-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "LI. Authentication, and access control"

1

Nabeel, Mohamed. "Session details: Access Control and Authentication." In CODASPY '18: Eighth ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3258528.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Qi, Lin, and Li Zhi. "Authentication and Access Control in Satellite Network." In 2010 Third International Symposiums on Electronic Commerce and Security (ISECS). IEEE, 2010. http://dx.doi.org/10.1109/isecs.2010.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cvrček, Tadeáš, and Petr Dzurenda. "Access Control System Using Multi-factor Authentication." In STUDENT EEICT 2022. Brno: Fakulta elektrotechniky a komunikacnich technologii VUT v Brne, 2022. http://dx.doi.org/10.13164/eeict.2022.190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fu, Zhi, and John C. Strassner. "Access Control and Authentication for Converged Wireless Networks." In 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services. IEEE, 2006. http://dx.doi.org/10.1109/mobiq.2006.340423.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fu, Zhi, and John C. Strassner. "Access Control and Authentication for Converged Wireless Networks." In 2006 3rd Annual International Conference on Mobile and Ubiquitous Systems. IEEE, 2006. http://dx.doi.org/10.1109/mobiqw.2006.361755.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nick, William, Joseph Shelton, Cory Sabol, and Albert Esterline. "Federated protocol for biometric authentication and access control." In 2017 Computing Conference. IEEE, 2017. http://dx.doi.org/10.1109/sai.2017.8252195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

de Oliveira, Adriana Esmeraldo, Gustavo Henrique Matos Bezerra Motta, and Leonardo Vidal Batista. "A multibiometric access control architecture for continuous authentication." In 2010 IEEE International Conference on Intelligence and Security Informatics. IEEE, 2010. http://dx.doi.org/10.1109/isi.2010.5484746.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bao, Lichun. "Location Authentication Methods for Wireless Network Access Control." In 2008 IEEE International Performance Computing and Communications Conference (IPCCC). IEEE, 2008. http://dx.doi.org/10.1109/pccc.2008.4745118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Xu, Cheng, Jianliang Xu, Haibo Hu, and Man Ho Au. "When Query Authentication Meets Fine-Grained Access Control." In SIGMOD/PODS '18: International Conference on Management of Data. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3183713.3183741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"CERTIFICATE-BASED ACCESS CONTROL AND AUTHENTICATION FOR DHCP." In 1st International Conference on E-business and Telecommunication Networks. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0001396100990106.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "LI. Authentication, and access control"

1

Narayan, K., and D. Nelson. Using Authentication, Authorization, and Accounting Services to Dynamically Provision View-Based Access Control Model User-to-Group Mappings. Edited by R. Presuhn. RFC Editor, December 2010. http://dx.doi.org/10.17487/rfc6065.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography